Movatterモバイル変換


[0]ホーム

URL:


US20220060490A1 - Cloud security monitoring of applications in paas services - Google Patents

Cloud security monitoring of applications in paas services
Download PDF

Info

Publication number
US20220060490A1
US20220060490A1US16/999,614US202016999614AUS2022060490A1US 20220060490 A1US20220060490 A1US 20220060490A1US 202016999614 AUS202016999614 AUS 202016999614AUS 2022060490 A1US2022060490 A1US 2022060490A1
Authority
US
United States
Prior art keywords
paas
web service
resource
usage
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US16/999,614
Other versions
US11811802B2 (en
Inventor
Benyamin FARSHTEINDIKER
Assaf Israel
Tomer WEINBERGER
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Technology Licensing LLC
Original Assignee
Microsoft Technology Licensing LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Technology Licensing LLCfiledCriticalMicrosoft Technology Licensing LLC
Priority to US16/999,614priorityCriticalpatent/US11811802B2/en
Assigned to MICROSOFT TECHNOLOGY LICENSING, LLC.reassignmentMICROSOFT TECHNOLOGY LICENSING, LLC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: FARSHTEINDIKER, BENYAMIN, ISRAEL, ASSAF, WEINBERGER, Tomer
Priority to EP21729102.0Aprioritypatent/EP4200731B1/en
Priority to PCT/US2021/030991prioritypatent/WO2022039806A1/en
Publication of US20220060490A1publicationCriticalpatent/US20220060490A1/en
Application grantedgrantedCritical
Publication of US11811802B2publicationCriticalpatent/US11811802B2/en
Activelegal-statusCriticalCurrent
Adjusted expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Abstract

A security threat detection system is used to monitor the physical resource usage of a hosted application in a PaaS service in order to detect anomalous behavior indicative of a security threat. The system analyzes the historical usage of the application's physical resources in order to determine the normal range of consumption of a resource by the application. A security threat alert is then provided when the application's resource consumption exceeds the normal range of consumption.

Description

Claims (20)

What is claimed:
1. A system comprising:
one or more processors; and
a memory that stores one or more programs that are configured to be executed by the one or more processors, the one or more programs including instructions that:
host an application as a Platform-as-a-Service (PaaS) web service in a virtual machine using virtual resources, the PaaS web service unaware of physical resources associated with the virtual resources;
obtain an application usage profile for the PaaS web service, the application usage profile having one or more statistics, a statistic representing normal consumption of a physical resource used by the PaaS web service;
monitor runtime usage of a first physical resource during execution of the PaaS web service;
correlate the first physical resource to a corresponding virtual resource used during operation of the PaaS web service via a process identifier of the PaaS web service;
compare the runtime usage of the first physical resource with a corresponding statistic; and
upon the comparison indicating an anomaly, initiate a warning of the anomaly.
2. The system ofclaim 1, wherein the one or more programs include further instructions that:
obtain historical resource consumption of the PaaS web service;
derive a threshold for one or more of the physical resources consumed by the PaaS web service; and
store the threshold in the application usage profile for the PaaS web service.
3. The system ofclaim 1, wherein the one or more programs include further instructions that:
obtain historical resource consumption of the PaaS web service;
cluster the historical resource consumption into one or more clusters for the first physical resource;
compute a centroid for the first physical resource; and
store the centroid in the application usage profile for the PaaS web service.
4. The system ofclaim 1, wherein the application usage profile includes one or more of processor consumption, memory consumption, number and types of disk I/O events, number of network packets transmitted, frequency of network packets transmitted, largest size of network packets transmitted, Internet Protocol (IP) addresses used in network packets transmitted, or identity of open ports.
5. The system ofclaim 1, wherein the statistic includes a threshold for the first physical resource,
wherein the one or more programs include further instructions to detect when the threshold for the first physical resource is exceeded during runtime usage of the PaaS web service.
6. The system ofclaim 1, wherein the one or more programs include further instructions that:
detect the anomaly when the runtime usage of the first physical resource exceeds a distance from a centroid representing normal usage consumption of the first physical resource.
7. The system ofclaim 1, wherein the statistic is derived from runtime usage of the first physical resource during multiple instances of the PaaS web service.
8. The system ofclaim 7, wherein the multiple instances of the PaaS web service operate on different virtual machines in different servers.
9. A computer-implemented method, comprising:
configuring an application as a Platform as a Service (PaaS) web service in a virtual machine with virtual resources, wherein the PaaS web service is isolated from identity of physical resources consumed by the PaaS web service;
during a training period, monitoring usage of the physical resources consumed by the PaaS web service;
correlating the virtual resources used by the application to corresponding physical resources using a process identifier of a process hosting an instance of the PaaS web service;
generating a mathematical model of normal resource consumption of at least one physical resource consumed by the PaaS web service;
using the mathematical model during runtime execution of the PaaS web service to detect abnormal behavior in runtime resource consumption of the at least one physical resource by the PaaS web service; and
generating an alert when the abnormal behavior is detected.
10. The computer-implemented method ofclaim 9, further comprising:
monitoring resource usage of the PaaS web service across all instances of the PaaS web service.
11. The computer-implemented method ofclaim 9, further comprising:
monitoring processor consumption and memory consumption of the PaaS web service.
12. The computer-implemented method ofclaim 9, further comprising:
monitoring features of network usage of the PaaS web service, the features including a number of network packets transmitted, sizes of the network packets transmitted, open ports, and Internet Protocol (IP) addresses used.
13. The computer-implemented method ofclaim 9, further comprising:
monitoring features of disk I/O usage of the PaaS web service, the features including identity of files accessed and a number of I/O operations made.
14. The computer-implemented method ofclaim 9, wherein the mathematical model of the normal resource consumption of the at least one physical resource consumed by the PaaS web service is derived from historical resource usage of the at least one physical resource by the PaaS web service during the training period.
15. The computer-implemented method ofclaim 9, wherein the mathematical model of normal resource consumption of the at least one physical resource consumed by the PaaS web service is derived from clustering historical resource usage of the at least one physical resource by the PaaS web service during the training period.
16. A device, comprising:
one or more processors and a memory;
the memory including a virtual machine configured to:
execute a Platform as a Service (PaaS) web service in the virtual machine, the PaaS web service utilizing virtual resources with no visibility to associated physical resources;
obtain normal usage data of the physical resources used by the PaaS web service;
extract runtime usage data of at least one physical resource used by the PaaS web service by mapping a virtual resource corresponding to the at least one physical resource through a process identifier of a process running an instance of the PaaS web service application on the virtual machine; and
determine a security threat when the runtime usage data of the at least one physical resource exceeds the normal usage data of the at least one physical resource.
17. The device ofclaim 16, wherein the virtual machine is further configured to:
analyze historical resource usage data of a first physical resource used by the PaaS web service to generate a threshold; and
detect the security threat when the runtime usage data for the first physical resource exceeds the threshold.
18. The device ofclaim 16, wherein the virtual machine is further configured to:
analyze historical resource usage data of the first physical resource to generate a centroid representing a measurement value of normal behavior of the fist physical resource when used by the application; and
detect the security threat when the runtime usage data for the first physical resource exceeds a distance from the centroid.
19. The device ofclaim 16, wherein the normal usage data represents processor consumption, memory consumption, number of network packets transmitted, frequency of network packets transmitted, number of disk I/O events, largest size of network packets transmitted, Internet Protocol (IP) addresses used in network packets transmitted, and/or identity of open ports.
20. The device ofclaim 16, wherein the historical usage data is derived from runtime usage of the physical resources across multiple instances of the PaaS web service.
US16/999,6142020-08-212020-08-21Cloud security monitoring of applications in PaaS servicesActive2042-03-31US11811802B2 (en)

Priority Applications (3)

Application NumberPriority DateFiling DateTitle
US16/999,614US11811802B2 (en)2020-08-212020-08-21Cloud security monitoring of applications in PaaS services
EP21729102.0AEP4200731B1 (en)2020-08-212021-05-06Cloud security monitoring of applications in paas services
PCT/US2021/030991WO2022039806A1 (en)2020-08-212021-05-06Cloud security monitoring of applications in paas services

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US16/999,614US11811802B2 (en)2020-08-212020-08-21Cloud security monitoring of applications in PaaS services

Publications (2)

Publication NumberPublication Date
US20220060490A1true US20220060490A1 (en)2022-02-24
US11811802B2 US11811802B2 (en)2023-11-07

Family

ID=76197578

Family Applications (1)

Application NumberTitlePriority DateFiling Date
US16/999,614Active2042-03-31US11811802B2 (en)2020-08-212020-08-21Cloud security monitoring of applications in PaaS services

Country Status (3)

CountryLink
US (1)US11811802B2 (en)
EP (1)EP4200731B1 (en)
WO (1)WO2022039806A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20220237285A1 (en)*2021-01-262022-07-28EMC IP Holding Company LLCCyber immunity system as a biological self-recognition model on operating systems
US20230006971A1 (en)*2021-06-302023-01-05Sony Group CorporationAnti-piracy control based on blacklisting function
CN119276853A (en)*2024-10-082025-01-07北京南天智联软件有限公司 A remote monitoring system for IT equipment based on the Internet of Things
US20250103705A1 (en)*2023-09-272025-03-27Hyundai Motor CompanyIdps dynamic allocation device and method based on resource usage recognition

Citations (12)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20100229239A1 (en)*2009-03-082010-09-09Deutsche Telekom AgSystem and method for detecting new malicious executables, based on discovering and monitoring characteristic system call sequences
US8473444B1 (en)*2009-08-282013-06-25Symantec CorporationManagement of actions in multiple virtual and non-virtual environments
US20160006633A1 (en)*2013-05-272016-01-07Hitachi, Ltd.Monitoring item selection method and device, and storage medium
US20190173903A1 (en)*2015-11-302019-06-06International Business Machines CorporationUser state tracking and anomaly detection in software-as-a-service environments
US20190213099A1 (en)*2018-01-052019-07-11NEC Laboratories Europe GmbHMethods and systems for machine-learning-based resource prediction for resource allocation and anomaly detection
US20190377871A1 (en)*2018-06-112019-12-12TmaxOS Co., Ltd.Container-Based Integrated Management System
US10805332B2 (en)*2017-07-252020-10-13Nicira, Inc.Context engine model
US10936717B1 (en)*2018-01-302021-03-02EMC IP Holding Company LLCMonitoring containers running on container host devices for detection of anomalies in current container behavior
US20210099478A1 (en)*2019-09-272021-04-01Mcafee, LlcMethods and apparatus to identify and report cloud-based security vulnerabilities
US20210117306A1 (en)*2019-10-222021-04-22Citrix Systems, Inc.Systems and methods for probing virtual, web and saas applications
US20210357509A1 (en)*2020-05-172021-11-18Avocado Systems, Inc.Deep application discovery and forensics for automated threat modeling
US20220207148A1 (en)*2020-12-262022-06-30Intel CorporationHardening branch hardware against speculation vulnerabilities

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20100229239A1 (en)*2009-03-082010-09-09Deutsche Telekom AgSystem and method for detecting new malicious executables, based on discovering and monitoring characteristic system call sequences
US8473444B1 (en)*2009-08-282013-06-25Symantec CorporationManagement of actions in multiple virtual and non-virtual environments
US20160006633A1 (en)*2013-05-272016-01-07Hitachi, Ltd.Monitoring item selection method and device, and storage medium
US20190173903A1 (en)*2015-11-302019-06-06International Business Machines CorporationUser state tracking and anomaly detection in software-as-a-service environments
US10805332B2 (en)*2017-07-252020-10-13Nicira, Inc.Context engine model
US20190213099A1 (en)*2018-01-052019-07-11NEC Laboratories Europe GmbHMethods and systems for machine-learning-based resource prediction for resource allocation and anomaly detection
US10936717B1 (en)*2018-01-302021-03-02EMC IP Holding Company LLCMonitoring containers running on container host devices for detection of anomalies in current container behavior
US20190377871A1 (en)*2018-06-112019-12-12TmaxOS Co., Ltd.Container-Based Integrated Management System
US20210099478A1 (en)*2019-09-272021-04-01Mcafee, LlcMethods and apparatus to identify and report cloud-based security vulnerabilities
US20210117306A1 (en)*2019-10-222021-04-22Citrix Systems, Inc.Systems and methods for probing virtual, web and saas applications
US20210357509A1 (en)*2020-05-172021-11-18Avocado Systems, Inc.Deep application discovery and forensics for automated threat modeling
US20220207148A1 (en)*2020-12-262022-06-30Intel CorporationHardening branch hardware against speculation vulnerabilities

Cited By (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20220237285A1 (en)*2021-01-262022-07-28EMC IP Holding Company LLCCyber immunity system as a biological self-recognition model on operating systems
US12153669B2 (en)*2021-01-262024-11-26EMC IP Holding Company LLCCyber immunity system as a biological self-recognition model on operating systems
US20230006971A1 (en)*2021-06-302023-01-05Sony Group CorporationAnti-piracy control based on blacklisting function
US12095732B2 (en)*2021-06-302024-09-17Sony Group CorporationAnti-piracy control based on blacklisting function
US20250103705A1 (en)*2023-09-272025-03-27Hyundai Motor CompanyIdps dynamic allocation device and method based on resource usage recognition
CN119276853A (en)*2024-10-082025-01-07北京南天智联软件有限公司 A remote monitoring system for IT equipment based on the Internet of Things

Also Published As

Publication numberPublication date
US11811802B2 (en)2023-11-07
WO2022039806A1 (en)2022-02-24
EP4200731A1 (en)2023-06-28
EP4200731B1 (en)2024-05-29

Similar Documents

PublicationPublication DateTitle
US11811802B2 (en)Cloud security monitoring of applications in PaaS services
US12126644B2 (en)Methods and apparatus to identify and report cloud-based security vulnerabilities
US11146581B2 (en)Techniques for defending cloud platforms against cyber-attacks
US10936717B1 (en)Monitoring containers running on container host devices for detection of anomalies in current container behavior
Yokoyama et al.Sandprint: Fingerprinting malware sandboxes to provide intelligence for sandbox evasion
US10176321B2 (en)Leveraging behavior-based rules for malware family classification
Gupta et al.An immediate system call sequence based approach for detecting malicious program executions in cloud environment
US10025929B2 (en)Detection of anomalous program execution using hardware-based micro-architectural data
US10147049B2 (en)Automatic generation of training data for anomaly detection using other user's data samples
US8484739B1 (en)Techniques for securely performing reputation based analysis using virtualization
US9832217B2 (en)Computer implemented techniques for detecting, investigating and remediating security violations to IT infrastructure
US10044737B2 (en)Detection of beaconing behavior in network traffic
US10320833B2 (en)System and method for detecting creation of malicious new user accounts by an attacker
CN107992751B (en) A real-time threat detection method based on branch behavior model
US10868823B2 (en)Systems and methods for discriminating between human and non-human interactions with computing devices on a computer network
US9535727B1 (en)Identifying virtual machines that perform inconsistent with a profile
US20150096019A1 (en)Software network behavior analysis and identification system
KR20200057402A (en)System and method for detecting malignant code based on virtual and real machine
US9171171B1 (en)Generating a heat map to identify vulnerable data users within an organization
US20240370533A1 (en)System to leverage active learning for alert processing
US20230096024A1 (en)Passive software identification for vulnerability management
Nhlabatsi et al.Threatriskevaluator: A tool for assessing threat-specific security risks in the cloud
US12373576B2 (en)Scenario-based cyber security system and method
US12388843B1 (en)Cyberattack detection using multiple stages of classifiers
US11853173B1 (en)Log file manipulation detection

Legal Events

DateCodeTitleDescription
FEPPFee payment procedure

Free format text:ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

ASAssignment

Owner name:MICROSOFT TECHNOLOGY LICENSING, LLC., WASHINGTON

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:FARSHTEINDIKER, BENYAMIN;ISRAEL, ASSAF;WEINBERGER, TOMER;REEL/FRAME:053580/0503

Effective date:20200819

STPPInformation on status: patent application and granting procedure in general

Free format text:RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPPInformation on status: patent application and granting procedure in general

Free format text:NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STPPInformation on status: patent application and granting procedure in general

Free format text:PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED

STCFInformation on status: patent grant

Free format text:PATENTED CASE


[8]ページ先頭

©2009-2025 Movatter.jp